{"vulnerability": "CVE-2025-3018", "sightings": [{"uuid": "873cbe39-262e-4be5-b917-b4a572670c35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30187", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m2ag5mcysc2t", "content": "", "creation_timestamp": "2025-10-02T20:42:51.147679Z"}, {"uuid": "0424de83-7cce-4074-a501-5e95ce601e28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30184", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lqv4g7amkm2j", "content": "", "creation_timestamp": "2025-06-05T20:02:37.412701Z"}, {"uuid": "1f282eb8-6df6-4a35-8dcd-8f96555bb5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30184", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr7lhcjivi2q", "content": "", "creation_timestamp": "2025-06-09T23:58:18.019649Z"}, {"uuid": "678d931d-2b93-496e-959a-cd9310ae86bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30184", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lr7miukask25", "content": "", "creation_timestamp": "2025-06-10T00:17:07.245345Z"}, {"uuid": "4ebbf1d5-ac22-4629-9788-a09a56b2fb0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30184", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "content": "", "creation_timestamp": "2025-06-05T10:00:00.000000Z"}, {"uuid": "c9358d3e-cc2b-4e26-b176-c52dfbe3e995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30183", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "content": "", "creation_timestamp": "2025-06-05T10:00:00.000000Z"}, {"uuid": "9eed069e-d994-4219-b86f-6c2994ab4aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30187", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lz47ztxdzp2g", "content": "", "creation_timestamp": "2025-09-18T11:17:29.039789Z"}, {"uuid": "6882ac38-fab0-4ea3-87eb-2bc62b7067b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m4h5iiegk225", "content": "", "creation_timestamp": "2025-10-30T23:46:51.691006Z"}, {"uuid": "a2da0d09-7a92-4a8f-a756-6832e5403cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115463434466788181", "content": "", "creation_timestamp": "2025-10-30T13:49:51.527688Z"}, {"uuid": "963d6192-aeca-45ce-8c4f-636c1f61df4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30188", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ib5pbxcm26", "content": "", "creation_timestamp": "2025-10-31T10:25:07.761894Z"}, {"uuid": "1a527db7-d039-47e2-a152-2c9a7482ac3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ibpp7ofi2u", "content": "", "creation_timestamp": "2025-10-31T10:35:07.959814Z"}, {"uuid": "ab9904a0-4778-4ea0-a5d8-b4d000371f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/115460537325572111", "content": "", "creation_timestamp": "2025-10-30T01:33:06.572884Z"}, {"uuid": "83469471-e7f4-462f-abd7-f3f21dca8ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30188", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ebc0fddc79f28e3db88f2f1b3c52a3bb", "content": "", "creation_timestamp": "2025-10-31T10:50:58.000000Z"}, {"uuid": "c18242bf-b435-47dc-a895-91f9fe9f17e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/97", "content": "", "creation_timestamp": "2025-10-29T16:47:27.000000Z"}, {"uuid": "e6b0f78c-b356-45ba-ab33-3dd5e07c7c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30185", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5epj5xeto2b", "content": "", "creation_timestamp": "2025-11-11T17:56:33.534593Z"}, {"uuid": "ba6ebeea-f710-426b-b6d9-bf0d453b0cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17803", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30184\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: CyberData\u00a0011209 Intercom could allow an unauthenticated user access to the Web Interface through an alternate path.\n\ud83d\udccf Published: 2025-06-09T22:05:25.031Z\n\ud83d\udccf Modified: 2025-06-09T22:05:25.031Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "creation_timestamp": "2025-06-09T22:32:35.000000Z"}, {"uuid": "b9f98267-7d3c-4a74-9eb4-7b887d4fa82f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m4euua66ao2q", "content": "", "creation_timestamp": "2025-10-30T02:07:01.926995Z"}, {"uuid": "c112c0d9-11ea-4f44-8a50-b0463e3536c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17810", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30183\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: CyberData\u00a0011209 Intercom\n does not properly store or protect web server admin credentials.\n\ud83d\udccf Published: 2025-06-09T22:30:24.576Z\n\ud83d\udccf Modified: 2025-06-09T22:30:24.576Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01", "creation_timestamp": "2025-06-09T23:32:54.000000Z"}, {"uuid": "6bfd4fcc-b298-4eab-9862-f23049b5d429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30189", "type": "seen", "source": "Telegram/hnc41FvgR2VyITu4BVl6HabBwFPEZ-H6ltaZ3k0o3hEQc60", "content": "", "creation_timestamp": "2026-03-27T11:16:46.000000Z"}, {"uuid": "689943e3-7457-43d5-a869-fa00eaebc3d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3018", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3018\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Users.php?f=delete. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T22:00:07.678Z\n\ud83d\udccf Modified: 2025-03-31T22:00:07.678Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302070\n2. https://vuldb.com/?ctiid.302070\n3. https://vuldb.com/?submit.524623\n4. https://github.com/csemfl/cve/blob/main/sql.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-03-31T22:31:22.000000Z"}, {"uuid": "e8054692-5af3-4ced-b2d4-f293f3d9d03e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30186", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6mgzqfmuz2a", "content": "", "creation_timestamp": "2025-11-27T13:11:15.814749Z"}, {"uuid": "8c93aa8d-f65d-45c3-863b-50cb6cc51fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3018", "type": "seen", "source": "https://t.me/cvedetector/21664", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3018 - SourceCodester Online Eyewear Shop SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3018 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Users.php?f=delete. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:33.000000Z"}]}